Title :
A peer-based hardware protocol for intrusion detection systems
Author :
White, Major Gregory B ; Huson, Captain Mark L
Author_Institution :
Dept. of Comput. Sci., United States Air Force Acad., CO, USA
Abstract :
A number of intrusion detection systems have been developed to detect intrusive activity on individual hosts and networks. These systems rely almost exclusively on a software approach to intrusion detection analysis and response. In addition, the network systems developed apply a centralized approach to the detection of intrusive activity. The problems introduced by the´s approach are twofold. First the centralization of these functions becomes untenable as the size of the network increases. However, the introduction of intermediate security systems increases the number of potential targets and introduces communication delays which are unacceptable for high bandwidth data transfers. Second, and more importantly, the combination of centralization and software implementation as an approach to network intrusion detection introduces a dangerous vulnerability. As intruders gain access to the system, they target the security software itself and the centralization ensures the compromise of the entire network. The solution to these problems is a hardware implementation of a decentralized approach to intrusion detection. This paper describes the hardware platform necessary to implement such a system. It also proposes an intrusion detection protocol which would be used by this hardware to communicate relevant intrusive activity events between heterogeneous systems connected in a network or internetwork. This work is based on the Cooperating Security Managers; a peer-based approach to intrusion detection developed at Texas A&M University
Keywords :
computer networks; internetworking; multivariable systems; protocols; security of data; Cooperating Security Managers; Texas A&M University; centralized approach; communication delays; decentralized approach; hardware implementation; hardware platform; heterogeneous systems; high bandwidth data transfer; intrusion detection protocol; intrusion detection systems; intrusive activity events; network intrusion detection; network systems; peer-based hardware protocol; software approach; software implementation; Bandwidth; Computer science; Data security; Delay; Frequency; Hardware; IP networks; Intrusion detection; Monitoring; Protocols;
Conference_Titel :
Military Communications Conference, 1996. MILCOM '96, Conference Proceedings, IEEE
Conference_Location :
McLean, VA
Print_ISBN :
0-7803-3682-8
DOI :
10.1109/MILCOM.1996.569200